WOLP LAN Power Control
ReviewAudited by ClawScan on May 10, 2026.
Overview
Review before installing: the skill mostly matches its LAN power-control purpose, but it can shut down devices, install a privileged client, and ships with a pre-filled device record that may not belong to you.
Install only if you intend the agent to control LAN device power. Before using it, clear the bundled device inventory, verify every MAC/IP/port, run dry-runs first, verify any external client packages before sudo installation, and change or restrict the client Web UI password immediately.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A mistaken target MAC/IP or unintended invocation could send a power-control packet to the wrong LAN device.
The included script sends UDP packets to a specified host/port for shutdown support. This matches the stated purpose, but it is a high-impact device-control action.
with socket.socket(socket.AF_INET, socket.SOCK_DGRAM) as sock:
sock.sendto(payload, (normalized_host, normalized_port))Confirm the target MAC address, IP address, port, and intended action before non-dry-run use; prefer `--dry-run` first.
Installing an unverified external package or build output as a service could affect the target machine beyond this skill.
The documented setup can download and install external release packages or build scripts with elevated privileges. This is related to the WOL-plus client purpose, but the artifacts do not show pinning, checksums, or signature verification.
download `installer_windows_amd64_v<version>.exe` from Releases ... `sudo dpkg -i wolp-client_<version>_amd64.deb` ... `bash scripts/build-deb.sh amd64 0.0.0-dev`
Use a trusted, pinned release; verify checksums/signatures where available; avoid sudo installation unless you trust the WOL-plus client source.
Until changed, anyone who can reach the Web UI may be able to access the client using default credentials.
The optional client exposes a Web UI with known default credentials. SKILL.md does tell the user to change the default password, so this is disclosed, but it is still a privilege boundary to notice.
Default Web UI access: ... username: `admin` ... password: `admin123`
Change the default password immediately, restrict access to the Web UI, and install only on machines you administer.
The agent may list or reuse a device entry that was not created for your network, and LAN device identifiers from prior use are persisted in the skill directory.
The bundled persistent inventory contains a real-looking LAN device record rather than an empty or clearly sample-only entry. Because the skill can act on inventory entries by device name, this stale context could be over-trusted or used for an unintended power-control target.
"device-c87f54": {
"mac": "C8:7F:54:9E:60:B2",
"host": "192.168.50.18",
"extra_data": "AA:BB:CC:DD:11:22"
}Clear or replace `assets/devices.json` before use, require explicit user-provided device details, and avoid acting on bundled inventory entries unless you created them.
